메뉴 건너뛰기




Volumn 8, Issue 2, 2013, Pages 171-189

Modeling of information security management parameters in Indian organizations using ISM and MICMAC approach

Author keywords

India; Information security; Information security management; Interpretive Structural Modelling (ISM); Key variables; MICMAC; Organizations

Indexed keywords


EID: 84910122222     PISSN: 17465664     EISSN: 17465672     Source Type: Journal    
DOI: 10.1108/JM2-10-2011-0054     Document Type: Article
Times cited : (62)

References (70)
  • 2
    • 84954553031 scopus 로고    scopus 로고
    • Case studies show value of ISO/IEC 27001 conformity
    • Alkaff, A.S. (2009), “Case studies show value of ISO/IEC 27001 conformity”, ISO Management Systems, January/February, pp. 33-38.
    • (2009) ISO Management Systems , Issue.January/February , pp. 33-38
    • Alkaff, A.S.1
  • 4
    • 84872944057 scopus 로고    scopus 로고
    • available at
    • Australia (2009), “Cyber security strategy”, available at: www.ag.gov.au/www/agd/rwpattach.nsf/VAP/%284CA02151F94FFB778ADAEC2E6EA8653D%29∼AG+Cyber+Security+Strategy+-+ for+website.pdf/$file/AG+Cyber+Security+Strategy+-+for+website.pdf.
    • (2009) Cyber security strategy
  • 5
    • 0005697229 scopus 로고    scopus 로고
    • Best practices in network security
    • Avolio, F.M. (2000), “Best practices in network security”, Network Computing, Vol. 60 No. 20.
    • (2000) Network Computing , vol.60 , Issue.20
    • Avolio, F.M.1
  • 6
    • 84954551976 scopus 로고    scopus 로고
    • Online retail banking: security concerns, breaches and controls
    • p.WileyHobokenNJ
    • Belasco, K. and Wan, S.-P. (2006), “Online retail banking: security concerns, breaches and controls”, Handbook of Information Security, Vol. 3, Wiley, Hoboken, NJ, p. 43.
    • (2006) Handbook of Information Security , vol.3 , pp. 43
    • Belasco, K.1    Wan, S.P.2
  • 7
    • 84954511016 scopus 로고    scopus 로고
    • Masters thesisavailable at
    • Berends, A.J. (2007), “Dealing with information loss”, Masters thesis, available at: www.tbm.tudelft.nl/fileadmin/Faculteit/TBM/Over_de_Faculteit/Afdelingen/Afdeling_Infrastructure_Systems_and_Services/Sectie_Informatie_en_Communicatie_Technologie/medewerkers/jan_van_den_berg/news/doc/arjen-berends.pdf.
    • (2007) Dealing with information loss
    • Berends, A.J.1
  • 9
    • 84954486121 scopus 로고    scopus 로고
    • available at
    • CERT (2009), CERT Research Annual Report 2009, available at: www.cert.org/research/2009research-report.pdf.
    • (2009) CERT Research Annual Report 2009
  • 10
    • 84954551631 scopus 로고    scopus 로고
    • available at
    • CSO (2010), Cyber Security Watch Survey Results, available at: www.csoonline.com/documents/pdfs/2010CyberSecurityResults.pdf.
    • (2010) Cyber Security Watch Survey Results
  • 15
    • 79953896107 scopus 로고    scopus 로고
    • available at
    • Estonia (2008), “Cyber security strategy”, available at: www.mod.gov.ee/files/kmin/img/files/Kuberjulgeoleku_strateegia_2008-2013_ENG.pdf.
    • (2008) Cyber security strategy
    • Estonia, E.1
  • 20
  • 21
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness
    • Herath, T. and Rao, H.R. (2009), “Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness”, Decision Support Systems, Vol. 47 No. 2, pp. 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 23
    • 33745838617 scopus 로고    scopus 로고
    • An empirical study of information security policy on information security elevation in Taiwan
    • Hong, K.-S., Chi, Y.-P., Chao, L.R. and Tang, J.-H. (2006), “An empirical study of information security policy on information security elevation in Taiwan”, Information Management & Computer Security, Vol. 14 No. 2, pp. 104-115.
    • (2006) Information Management & Computer Security , vol.14 , Issue.2 , pp. 104-115
    • Hong, K.S.1    Chi, Y.P.2    Chao, L.R.3    Tang, J.H.4
  • 32
    • 34250015784 scopus 로고    scopus 로고
    • Embedding information security into the organization
    • Johnson, M.E. and Goetz, E. (2007), “Embedding information security into the organization”, IEEE Security and Privacy, May/June, pp. 16-24.
    • (2007) IEEE Security and Privacy , Issue.May/June , pp. 16-24
    • Johnson, M.E.1    Goetz, E.2
  • 35
    • 44049084950 scopus 로고    scopus 로고
    • The top information security issues facing organizations: what can government do to help?
    • Knapp, K.J., Marshall, T.E., Rainer, R.K. and Morrow, D.W. (2006), “The top information security issues facing organizations: what can government do to help?”, Information Systems Security, Vol. 15 No. 4, pp. 51-58.
    • (2006) Information Systems Security , vol.15 , Issue.4 , pp. 51-58
    • Knapp, K.J.1    Marshall, T.E.2    Rainer, R.K.3    Morrow, D.W.4
  • 36
    • 84954553031 scopus 로고    scopus 로고
    • Case studies show value of ISO/IEC 27001 conformity
    • Kumar, A. (2009), “Case studies show value of ISO/IEC 27001 conformity”, ISO Management Systems, January/February, pp. 33-38.
    • (2009) ISO Management Systems , Issue.January/February , pp. 33-38
    • Kumar, A.1
  • 38
    • 84954547154 scopus 로고    scopus 로고
    • available at
    • McAfee (2011), Risk and Compliance Outlook, available at: www.mcafee.com/us/resources/reports/rp-risk-compliance-outlook-2011.pdf.
    • (2011) Risk and Compliance Outlook
    • McAfee, M.1
  • 39
    • 33749653120 scopus 로고    scopus 로고
    • ISO 17799: best practices in information security management?
    • Ma, Q. and Pearson, J.M. (2005), “ISO 17799: best practices in information security management?”, Communications of the AIS, Vol. 15, pp. 577-591.
    • (2005) Communications of the AIS , vol.15 , pp. 577-591
    • Ma, Q.1    Pearson, J.M.2
  • 40
    • 84954558487 scopus 로고    scopus 로고
    • available at:Department of Information TechnologyMinistry of Communications Information Technology Government of India
    • MIT (2011), Discussion Draft on National Cyber Security Policy, Department of Information Technology, Ministry of Communications and Information Technology Government of India, available at: www.mit.gov.in/sites/upload_files/dit/files/ncsp_060411.pdf.
    • (2011) Discussion Draft on National Cyber Security Policy
  • 42
  • 44
    • 1842829828 scopus 로고    scopus 로고
    • NIST Special Publication 800-30available at
    • NIST (2002), Risk Management Guide for Information Technology Systems, NIST Special Publication 800-30, available at: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
    • (2002) Risk Management Guide for Information Technology Systems
  • 46
    • 34748842440 scopus 로고    scopus 로고
    • NIST Special Publication 800-100available at
    • NIST (2006b), Information Security Handbook: A Guide for Managers, NIST Special Publication 800-100, available at: http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf.
    • (2006) Information Security Handbook: A Guide for Managers
  • 47
    • 70350663440 scopus 로고    scopus 로고
    • NIST Special Publication 800-55Revision 1available at
    • NIST (2008), Performance Measurement Guide to Information Security, NIST Special Publication 800-55, Revision 1, available at: http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf.
    • (2008) Performance Measurement Guide to Information Security
  • 49
    • 84873139978 scopus 로고    scopus 로고
    • NIST Special Publication 800-39available at
    • NIST (2011), Managing Information Security Risk, NIST Special Publication 800-39, available at: http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf.
    • (2011) Managing Information Security Risk
  • 57
    • 0029482609 scopus 로고
    • The objectives of waste management in India: a future inquiry
    • Sharma, H.D., Gupta, A.D. and Sushil (1995), “The objectives of waste management in India: a future inquiry”, Tech. Forecast. & Social Change, Vol. 48, pp. 285-309.
    • (1995) Tech. Forecast. & Social Change , vol.48 , pp. 285-309
    • Sharma, H.D.1    Gupta, A.D.2    Sushil, S.3
  • 59
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, T. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, T.1
  • 61
    • 15744368808 scopus 로고    scopus 로고
    • Information security obedience: a definition
    • Thomson, K.-L. and von Solms, R. (2005), “Information security obedience: a definition”, Computers & Security, Vol. 24, pp. 69-75.
    • (2005) Computers & Security , vol.24 , pp. 69-75
    • Thomson, K.L.1    von Solms, R.2
  • 65
    • 84891084966 scopus 로고    scopus 로고
    • Parameter extraction for measurement of the effective information security management – statistical analysis
    • Vaish, A. and Varma, S. (2010), “Parameter extraction for measurement of the effective information security management – statistical analysis”, International Journal of Computer and Electrical Engineering, Vol. 2 No. 4, pp. 1793-8163.
    • (2010) International Journal of Computer and Electrical Engineering , vol.2 , Issue.4 , pp. 1793-8163
    • Vaish, A.1    Varma, S.2
  • 66
    • 33747053670 scopus 로고    scopus 로고
    • Information security-the forth wave
    • Von Solms, B. (2006), “Information security-the forth wave”, Computers & Security, Vol. 25, pp. 165-168.
    • (2006) Computers & Security , vol.25 , pp. 165-168
    • Von Solms, B.1
  • 67
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • Von Solms, B. and Von Solms, R. (2004), “The 10 deadly sins of information security management”, Computer & Security, Vol. 23 No. 3, pp. 191-198.
    • (2004) Computer & Security , vol.23 , Issue.3 , pp. 191-198
    • Von Solms, B.1    Von Solms, R.2
  • 69
    • 0015956034 scopus 로고
    • Developing interconnected matrices in structural modeling
    • Warfield, J.W. (1974), “Developing interconnected matrices in structural modeling”, IEEE Transactions on Systems Men and Cybernetics, Vol. 4 No. 1, pp. 51-81.
    • (1974) IEEE Transactions on Systems Men and Cybernetics , vol.4 , Issue.1 , pp. 51-81
    • Warfield, J.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.